Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for constructing malicious file detection model and method for detecting malicious files

A malicious file and detection model technology, applied in the field of network security, can solve problems such as low accuracy, unsuitable online environment, inability to identify and kill in time, and achieve the effect of avoiding harm and improving accuracy

Pending Publication Date: 2020-09-29
上海斗象信息科技有限公司
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method not only does not detect and kill new malware in a timely manner, but also cannot identify and kill known malware in a timely manner with only a slight change of part of the code or a new shell
In addition, although AI-related algorithms have been applied to malicious file detection in recent years, they all have problems such as low accuracy or not suitable for online environments.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for constructing malicious file detection model and method for detecting malicious files
  • Method for constructing malicious file detection model and method for detecting malicious files
  • Method for constructing malicious file detection model and method for detecting malicious files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The specific implementation manner of the present invention will be described in more detail below with reference to schematic diagrams. The advantages and features of the present invention will be more apparent from the following description. It should be noted that all the drawings are in a very simplified form and use imprecise scales, and are only used to facilitate and clearly assist the purpose of illustrating the embodiments of the present invention.

[0060] In the following, the terms "a", "two", etc. are used to distinguish between similar elements and not necessarily to describe a specific order or chronological order. It is to be understood that these terms so used are interchangeable under appropriate circumstances. Similarly, if a method described herein includes a series of steps, the order in which these steps are presented is not necessarily the only order in which these steps can be performed, and some described steps may be omitted and / or some not de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for constructing a malicious file detection model and a method for detecting malicious files. In the method for constructing a malicious file detection model, a static random forest model, a static LightGBM model, a dynamic random forest model, a dynamic important characteristic random forest model and a dynamic LightGBM model which are used for detecting malicious files are established to form a fusion model, and the fusion model is combined with a malheur model to form a malicious file detection model. According to the malicious file detection model, suspicious malicious files can be found in time, and therefore harm caused by the malicious files is avoided. According to the method for detecting malicious files, the malicious file detection model and a third-party tool are adopted for detection, when new malicious files or malicious software is continuously presented, the malicious files or the malicious software can be found in time to be searched and killed, the accuracy is improved, and the method can adapt to an online detection environment.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a detection model for constructing malicious files and a method for detecting malicious files. Background technique [0002] In recent years, the Internet industry has developed vigorously, and the Internet has become the main way for people to obtain information. With the emergence of various new websites, network information has grown exponentially, and the accompanying security problems have become more and more serious. Malware formed by some malicious files is installed on computers through channels such as websites or email links, but without the user's knowledge, the malware will cooperate with other attack methods to steal user information and even company information. [0003] In the prior art, although a large number of detection and killing schemes have been proposed for malicious software, the existing detection and killing schemes are mainly to establish a v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/562G06F21/566
Inventor 徐钟豪王彦磊谢忱
Owner 上海斗象信息科技有限公司